Secure computation on floating point numbers M Aliasgari, M Blanton, Y Zhang, A Steele Cryptology ePrint Archive, 2012 | 124 | 2012 |
Secure outsourcing of DNA searching via finite automata M Blanton, M Aliasgari IFIP Annual Conference on Data and Applications Security and Privacy, 49-64, 2010 | 122 | 2010 |
Data-oblivious graph algorithms for secure computation and outsourcing M Blanton, A Steele, M Alisagari Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 96 | 2013 |
Analysis of reusability of secure sketches and fuzzy extractors M Blanton, M Aliasgari IEEE transactions on information forensics and security 8 (9), 1433-1445, 2013 | 62 | 2013 |
Secure outsourced computation of iris matching M Blanton, M Aliasgari Journal of Computer Security 20 (2-3), 259-305, 2012 | 34 | 2012 |
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model M Aliasgari, M Blanton, F Bayatbabolghani International Journal of Information Security 16 (6), 577-601, 2017 | 30 | 2017 |
On the (non-) reusability of fuzzy sketches and extractors and security in the computational setting M Blanton, M Aliasgari Proceedings of the International Conference on Security and Cryptography, 68-77, 2011 | 29 | 2011 |
Secure computation of hidden Markov models M Aliasgari, M Blanton 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 23 | 2013 |
Secure computation of biometric matching M Blanton, M Aliasgari Department of Computer Science and Engineering, University of Notre Dame …, 2009 | 16 | 2009 |
On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting M Blanton, M Aliasgari Cryptology ePrint Archive, 2012 | 14 | 2012 |
Recent advancements in microarchitectural security: Review of machine learning countermeasures H Sayadi, H Wang, T Miari, HM Makrani, M Aliasgari, S Rafatirad, ... 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020 | 12 | 2020 |
Security vulnerabilities in mobile health applications M Aliasgari, M Black, N Yadav 2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018 | 12 | 2018 |
Secure fingerprint alignment and matching protocols F Bayatbabolghani, M Blanton, M Aliasgari, M Goodrich arXiv preprint arXiv:1702.03379, 2017 | 7 | 2017 |
When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection Z He, T Miari, HM Makrani, M Aliasgari, H Homayoun, H Sayadi 2021 22nd International Symposium on Quality Electronic Design (ISQED), 85-90, 2021 | 6 | 2021 |
Sesame: a secure and convenient mobile solution for passwords M Aliasgari, N Sabol, A Sharma 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-5, 2015 | 4 | 2015 |
Automated Detection of Sewer Pipe Structural Defects Using Machine Learning J Huang, KE Leung, R Verceles, W Chen, B Englert, M Aliasgari Proceedings of the Water Environment Federation 2017 (6), 4605-4615, 2017 | 3 | 2017 |
Mobile Healthcare in an Increasingly Connected Developing World N Yadav, M Aliasgari, C Poellabauer International Journal of Privacy and Health Information Management (IJPHIM …, 2016 | 3 | 2016 |
Ensuring authentication and security using zero knowledge protocol for wireless sensor network applications M Mozumdar, M Aliasgari, SMV Venkata, SS Renduchintala International Journal of Computing and Digital Systems 5 (03), 2016 | 3 | 2016 |
Deep Encoder–Decoder Neural Networks for Retinal Blood Vessels Dense Prediction W Zhang, L Li, V Cheong, B Fu, M Aliasgari International Journal of Computational Intelligence Systems 14 (1), 1078, 2021 | 2 | 2021 |
Adaptive-HMD: Accurate and Cost-Efficient Machine Learning-Driven Malware Detection using Microarchitectural Events Y Gao, HM Makrani, M Aliasgari, A Rezaei, J Lin, H Homayoun, H Sayadi 2021 IEEE 27th International Symposium on On-Line Testing and Robust System …, 2021 | 1 | 2021 |